Internal differential collision attacks on the reduced-round Grøstl-0 hash function Kota IdeguchiElmar TischhauserBart Preneel OriginalPaper 21 April 2012 Pages: 251 - 271
Proofs of two conjectures on the dimensions of binary codes Junhua Wu OriginalPaper 06 May 2012 Pages: 273 - 304
Local duality theorem for q-ary 1-perfect codes Soohak ChoiJong Yoon HyunHyun Kwang Kim OriginalPaper 06 May 2012 Pages: 305 - 311
The exponent of a polarizing matrix constructed from the Kronecker product Myung-Kyu LeeKyeongcheol Yang OriginalPaper 11 May 2012 Pages: 313 - 322
Signcryption schemes with threshold unsigncryption, and applications Javier HerranzAlexandre RuizGermán Sáez OriginalPaper 16 May 2012 Pages: 323 - 345
On self-dual cyclic codes over finite chain rings Aicha BatoulKenza GuendaT. Aaron Gulliver OriginalPaper 25 May 2012 Pages: 347 - 358
On the distinctness of modular reductions of primitive sequences over Z/(232−1) Qun-Xiong ZhengWen-Feng QiTian Tian OriginalPaper 30 May 2012 Pages: 359 - 368
Linear hulls with correlation zero and linear cryptanalysis of block ciphers Andrey BogdanovVincent Rijmen OriginalPaper 30 May 2012 Pages: 369 - 383
Finite number of fibre products of Kummer covers and curves with many points over finite fields Ferruh ÖzbudakBurcu Gülmez Temür OriginalPaper 07 June 2012 Pages: 385 - 404
Linear codes using skew polynomials with automorphisms and derivations D. BoucherF. Ulmer OriginalPaper 12 June 2012 Pages: 405 - 431